Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
7a88dbd37e965a4cc769d326d52772f6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a88dbd37e965a4cc769d326d52772f6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7a88dbd37e965a4cc769d326d52772f6_JaffaCakes118.html
-
Size
4KB
-
MD5
7a88dbd37e965a4cc769d326d52772f6
-
SHA1
3ac470ecddbe3541d67882c87c3fc2e0f18aefad
-
SHA256
89996fe334f10d586b0b5228b06b9ca6f81acf538cf6f23ae2901c1bf2096897
-
SHA512
7373b593fad1da249fb118d995e3ffa90d015496d80c11013032a7e2beb73fd17c12f0ee3ac977661442d1f8641c2d4d601003c0288b53daf93963a9f8c42f53
-
SSDEEP
96:rf9seakGiwLsvfpFFOxUE4vBUqsOeN0Eg9jag0MwU:rf9FaL7LQFIa7vBRlVEg9+g0MwU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DC17DD1-1C6D-11EF-BC3A-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001c2d14c6b7685e4ba01ec27be9f7be89000000000200000000001066000000010000200000006b2f75ec8c2bf6ca6ef6173f9b082f7a2c8e1aab0d354e6619839713036c5274000000000e8000000002000020000000fd2c4a1dfc4eee95d21b6b999467ffc9125de379681ca7bff10090d4719a8aae20000000fc999af56976e94ef54a8b5f0093a5c40550b1ec63b957e6f4ac0a976db7ee8a4000000086361460cc3f1c38cc75d292dc3179f604ac1e77697a64081270d8de1f6c566822e6c33a304dc849b42e0ee04e5f61d5d72829c1fa80a3992211d86945a4c629 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01b6c227ab0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001c2d14c6b7685e4ba01ec27be9f7be8900000000020000000000106600000001000020000000604a02cd11238515825b4fd9b94f0537caa7ae9db452175489fddead75b521d1000000000e800000000200002000000018ae51f97ccfd79a2eb009843bd2905a515aac2cda4395fed7c7ca4f0205dd279000000041bea0d39f9817821bae4bc9d3ac8da74568484b09a8dfc0f3cd26b691eab3cab6a1d0db50bbceb413e3fc66a592fc74bf0ab1f10d5f8bac2c2c5d27eb4f7f1994782ce099e24a0e72f0ff49d00f0f5758f7c4f65a9520466df71ad105562b722088cc1cf9ff74a0346a211b3f4256e96ac4764cb1cd0385c8e59966f925b0b1f22b61cf5471c949706ed99e1c7d270a400000008507c61f13fbae76b1449663ebdcf769bfe572ce399fa32b6c1d182b88226b5d46be59f9a4aa657db5d9d881d1cd7b00fec71e8b0cdebd8df694a2325cc5a1a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423005993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2932 2004 iexplore.exe 28 PID 2004 wrote to memory of 2932 2004 iexplore.exe 28 PID 2004 wrote to memory of 2932 2004 iexplore.exe 28 PID 2004 wrote to memory of 2932 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a88dbd37e965a4cc769d326d52772f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5323c357fcefe17e24cdfd82eb438a304
SHA17761e746ed6f93543b32a1c059cc675402c9fe81
SHA256e610f8d4e4b5deb2e577d3e9b4b5e6df81030bc180b05381b98d239a01f8f695
SHA512c55d51ae74dda21608c9375cdaa73cf59c05e515b75da4334c68be1787255b8c7baf254199ae0a44de9c654844a649375068e8b3a87cf5d3b909c6596f7eaee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500f19f6c4e74886bae99893ac45d2b5b
SHA12d0c03be34cdd2b75cac61a4cae68fba4d64e9ed
SHA25650c6a686b8112a5eb18b0c10d518ca3feecf289462552ec442ae9b0153d32553
SHA51219f7531c881531fc831d86504e1d2f9e67ff9e8fff4176e5137711d65ebee9c25bf64b8d049d01ccd0413a21e0f1379d11eac095b158571e81a247fcfb1fcc6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54880df2a7f086957f14438401b4e1422
SHA19f5a3ebd28b98d4636c97e31f1bac2c0cb800dc1
SHA256d0a35d64be27cef87203dae193f2cc62d8497ef09b11c53ccab0c80b99ab4338
SHA51202216cdd5b7fb79d42d3b00c015030b182d11c3de580bbac72eac2f228cb2970abb4d0b7f49a94bc4d912e86968d2ad97f9b4b1b4d99aed3a9f3d22113958c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a01cee255d740b46b040d3d683f74f2
SHA1466850a2216097d7fcb6b87bf71a574bf5080fb7
SHA256c4135ad391d0839feeb78040d725eeb7907549272050c293caeb2e381a692466
SHA512fd1c3f56572ef4f8891868fa4eca07fd00dcaff68eefa67c9a91660a5fd8bb6165f2373730ca62fe04f5337c4789c79a6cbf1718916875a444038833b7380217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd814d0f6e0facad6027996e966a1efa
SHA16075d347f69f294d955bed4c79c4cc20a93c96d8
SHA2561cfa663d5b54c64c96254c4322177fe3d1403f89cb7758e117f37df7a14f9ed8
SHA512de3f8f1c3aee71fccf3b2742ff2c49f0ca03bb6fd0a55347725b3a20398914a7223372ebbb180c302de026052ad96c43887f758deb261fecf5a0a6da3203c49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ddf2fa8c8837b7b1e65a8a358c3ca93
SHA1a47e95716ecee81078f16cda8458f8d9dc6168db
SHA2569475440780e02d0a7e3d279252e26964fab6667bc946ae438661d0f47a98a583
SHA5127d431a9778f76188603e3bf2b90b08e6ca540ab5c753c2842b5aeff08595173b3772197d7a681805c1b80c5d13ae03566d3340b02e1ccf7f0c1aad7af4ebd02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5613ed9ec0cf457773eca177323a661c1
SHA1f8edba886af0566fc2e30a925958bd2ceba4573e
SHA256c64c5204db836f757c7f7e919e536f048e5c9cfde12050938def87bfc01dfd95
SHA512821659fada841b4fbfdc8ed573b56a9385e1a3d08003c2b2e845e6780283b05780f400644d03c8b8b58a9378cb2d9c93021754c9b0a9c4c3c32855c6b79867a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53efdfe74cf7e056c56e8c31b580c78a8
SHA16262908d6b595dea519023a79cd818c15bce6def
SHA256c48a21fb519b81f7397a8268e2e49b6b317b8e9c474b3ef2d42d782174b29eb5
SHA51254ba441de2bc7e4cbee962171a1244ea7206a4e537e4b27fa5410f814bb5a9014541bbb17ea73805954d29a7add2efe93951e1283557254731453cd0f4c3c742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d485f2d01b7ad92fc625e890c36939bd
SHA15b85fc8be9b1b3ab93c34907ff5f27f2650e9ad2
SHA256eb99f599bcad73385452b6e102ea6ae0da47399b4004ad8883c7b2a6b3616af3
SHA512fb2776fc5b87aada2f542bb9423e41840315c3f3a7ae73431e9d1709474ec306c66df06a42e76c8dacac0c5a8a0db2243acfe999ecc4bf46ac999b812ac2796f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548ee40b4af843920d9043041a61ab4b4
SHA1d0d0d59e5e38256e89fce1461b00694e0ba65fd4
SHA25610c137861728c2a15a218af7d453ac9ac7ef5ee464476b9f0225ac11bb9ea7a5
SHA512e399ff8def66ce9a52d99b6f4a3913b1c6bb8991511dcbc5e78fdac0558935aa5342ed790257e000ee4a602c7072aa5255a72637f8257d44b28a6677b9fdc27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0a24660d8e18eeb636cef9f063d55e2
SHA1d7f1e3eff2963e213e28d0176bec6ac6621c9dc0
SHA256d2c2340c70914642f92e6d537332d4ea182efe5ce09f62c71ab6cf4de2655a9f
SHA512dca9805e68dfce090e33b7b9f394dcc3c5251f88946774fade6b4c433d7e7a6714996fbd3ed9a814a62d702ae10ecddc728b4eb9b440c56863b21a7757f48067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552c96d4a7ad152c3f821ae729869c14f
SHA1b3ee45b659ca94ab68ab7f0ab2cabd65bc94f325
SHA2562bc224290f3a22465167c46a7f76d6bc211150ced6df91b0f3244e0f1bdd8639
SHA5121503f19061968a3b93320c4af7eab98a476bb0e3630167ca022310d654d8f6446f775a46d03876c57348918b02805fe1ac14178852b90c5e0a5906e5e7506568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4cf3e9d7cf4629fac68b0337c997868
SHA1d7026fe1b343fa65f340163e11ba016fc7f8a393
SHA25640552e6b840fd56e4c02733a94ae1bb662ffcc50dde976eb83582b028d8d628b
SHA512678c04f71dcbdcfe1597d9285fe9d4e355756fd4abb060c66f58e12f989d56cf796156876ca358a55f7a4c6642df173cf1bbc36e8fc8575101872addbafa3158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502afee6066186a5475173e546f11ddfa
SHA159fc961abf5b61c750c757d81680342c01dfbed2
SHA2564eddcec1ad809212fbfc2752b75c7244320d96c1ae1e6705994a39f413fc0ecc
SHA5127ae19ba57b4e6a29c309364b2e89148b83990f7e66cfd9ed63fa749f263efecfa41a2638bc422b81886b1d8342bde33a41361cae670b1e57994909333afe57b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e48b8f531cea1f6afda0fd6deb5d6b04
SHA11381475f5d720cb89c0c7bb9be892982be05e7a3
SHA2560c999a71f8665e03be61c606650bf5dd4cb7fcddfc9c5591a0fc464beb4ff169
SHA51287695d99c0f5d9be1f87d2ec9b52f065c1744260a98805dcf08e5e1e6db9a693811779d7a4aaba3e4aabba0125aa6b02c40bf809b283c32deba83d73157c010c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b168cb47f8fe2e0b6a71440cd7a7baf3
SHA10605d908727d6e478fff2b47f9a1e0b06969426e
SHA2566167c4decf616f91dd93d05ab1ca7861d409515a1659ebccc22798c26da79cfa
SHA5126c1f79a29228626088b8bdc02ab1c9db6ee1fe704e3bc063ae9f9fb209726332b6ff32a599fc7fc8146b4c0d696adb368584808e45274b946eaf68fb99cf699d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad3acb02760c18e4e2b3703db209a063
SHA1bc285d189e497b414b60ff68c44aab65863b742c
SHA256f401d0b33a4b7d3eabda1dc4fb5cdabe5c682109181dd84d628411d25ec1d875
SHA5127628400edbc257c76c95d8004e0432c861f634ae057e9ead49ca6c1b4ecfcc0e9c45a9eb87ecfb69985a7ca42a84baaaf57b3488a15491682b92fd97a4e19fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594577bfecfc9a57c02ccae6ddd711bc4
SHA10a60ff8d2ba7ef1c598da45b4bca07142e10d2cf
SHA25633968d3034d7c4ba7e6264bfe9862ac124abe836c76206f016df0f4da2773c7a
SHA512ef436d4abb615da2f8b71fa01d0fea21cabd092b9b72c04efe5109f814263b254287e972694ef0acb9b056ab1e6922143411cb582aebdd3afb39ade7fe07bc4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52260e94755ee5c5031e17ad901e2eb54
SHA18c1acd79f8a07b3cda452c40e3e9aa42f676b89b
SHA25652109fa52dce3d05540976e5f45ab4d63de69a81492dee778750068f3d22a94a
SHA512b9d9fc3aed407313a2f9a192d4ad3c1b291380446a5344349ad39fb0fd06b6f247e6799d3ef94ee78cd1870b925d0610bcf16429d90f1211f9d0cd80d80c66ed
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a